Consumerization of IT within Microsoft by Richard Qi

Consumerization of IT (CoIT) is a reality to many organizations today. Employees more and more want to use their personal electronic devices to do their jobs, and utilize the same technologies and applications at work that they use at home. This blending of consumer and enterprise technologies is the Consumerization of IT, and it boosts employee productivity and satisfaction. However, it can make it difficult for IT departments to ensure an enterprise’s data security and integrity.

Many people think CoIT is only about “Devices Management”. To have a successful CoIT strategy, we also need to think about People, Security and Management, , and Productivity. Microsoft IT built the support for CoIT based on following four pillar.

 

Windows PCs and other devices: Classify what are enterprise-standard, consumer-standard, and nonstandard devices, and then determine the various support models for each.

Look at your support model, think about how difference devices will be supported and what level of support each kind of devices gets.

Security and management: Determine how to manage and control these devices, and their users’ access to intellectual property, and then ensure data’s integrity and security once users place it on these devices.

Different people may handle different information, HR and Finance Department typically handle more sensitive data and information. Classify different data and information then build access and control polices around it. For example, highly business impact (Like HR and Finance records) data and information should be only accessed from managed devices. Low business impact data and information may be accessed through unmanaged devices to enable flexibility.

Productivity: Determine which applications and technologies to support on employees’ devices to ensure that they continue to be satisfied and productive.

Unified application development: Establish best practices for line-of-business (LOB) application development, and ensure a secure development lifecycle and marketplace for these applications

Below table (Click to enlarge) illustrate how Microsoft IT support Bring Your Own Device (BYOD) for both Windows and Non-Windows Devices. It also shows what kind of access each device can get.

Here is list of technologies that involved to build this approach.

Let me know your thoughts around CoIT, simply just leave comments!

Related Posts

Leave a Reply